Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Regularity properties of definable sets of reals.. Ann. Pure Appl. Log., 29 (3): 289-324 (1985)A New Look at the Interpolation Problem.. J. Symb. Log., 40 (1): 1-13 (1975)The Herbrand Symposium: (Marseilles July 16-July 24 1981).. J. Symb. Log., 48 (4): 1210-1232 (1983)Probing Attacks on Tamper-Resistant Devices., , and . CHES, volume 1717 of Lecture Notes in Computer Science, page 303-315. Springer, (1999)Generation of Shared RSA Keys by Two Parties., and . ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, page 11-24. Springer, (1998)Cryptanalysis of Another Knapsack Cryptosystem., and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 470-476. Springer, (1991)Adapting Density Attacks to Low-Weight Knapsacks., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 41-58. Springer, (2005)A New Identification Scheme Based on Syndrome Decoding.. CRYPTO, volume 773 of Lecture Notes in Computer Science, page 13-21. Springer, (1993)The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications., and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 31-46. Springer, (1999)Designing Identification Schemes with Keys of Short Size.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 164-173. Springer, (1994)